Privacy and security
The Tangled Web We Have Woven
Seeking to protect the fundamental privacy of network interactions.
Divided By Division
Is there a "best used by" date for software?
George V. Neville-Neil
Reflections on Stanford's MOOCs
New possibilities in online education create new challenges.
Steve Cooper, Mehran Sahami
Economic and business dimensions
The Value of Microprocessor Designs
Applying a centuries-old technique to modern cost estimation.
Ana Aizcorbe, Samuel Kortum, Unni Pillai
Cloud Services Certification
How to address the lack of transparency, trust, and acceptance in cloud services.
Ali Sunyaev, Stephan Schneider
Our authentication system is lacking. Is improvement possible?
New Approaches to Security and Availability For Cloud Data
Extending the data trust perimeter from the enterprise to the public cloud requires more than encryption.
Ari Juels, Alina Oprea
Symbolic Execution For Software Testing: Three Decades Later
The challenges — and great promise — of modern symbolic execution techniques, and the tools to help implement them.
Cristian Cadar, Koushik Sen
Power Challenges May End the Multicore Era
Tthe microprocessor industry has shifted to multicore scaling as its principal strategy for continuing performance growth. However, while transistor count increases continue, the per-transistor speed and energy efficiency improvements …
Hadi Esmaeilzadeh, Emily Blem, Renée St. Amant, Karthikeyan Sankaralingam, Doug Burger
Puzzled: Tumbling Dice
These puzzles involve computing probabilities associated with dice.